Wireless communication techniques for controlling access granted by a security device
First Claim
1. A method of using wireless communication for controlling access granted by a security device, comprising the steps of:
- verifying a mobile station identifier of a mobile station that provided the mobile station identifier to the security device;
transmitting a security code to the mobile station responsive to verifying the mobile station identifier; and
providing a pass code to the security device for enabling the security device to grant access responsive to receiving the security code from the mobile station.
5 Assignments
0 Petitions
Accused Products
Abstract
Wireless communication techniques are useful for controlling access granted by a security device (22). In a disclosed example, a communication portion (24) comprises a residential gateway that is capable of communicating with a mobile station (30) over a local network (32). The communication portion (24) is also capable of communicating with a remotely located server (40) over a secure network connection (42) such as over the internet. The mobile station (30) identifies itself to the security device (22). The mobile station identifier is verified to determine authorization to gain the requested access. The security device (22) provides the mobile station identifier to the remote server (40) which provides a security code to the mobile station (30) and a pass code to the security device (22). The security device (22) uses the pass code to verify the security code received from the mobile station (30) and controls access accordingly.
-
Citations
10 Claims
-
1. A method of using wireless communication for controlling access granted by a security device, comprising the steps of:
-
verifying a mobile station identifier of a mobile station that provided the mobile station identifier to the security device; transmitting a security code to the mobile station responsive to verifying the mobile station identifier; and providing a pass code to the security device for enabling the security device to grant access responsive to receiving the security code from the mobile station. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of using wireless communication for controlling access granted by a security device, comprising the steps of:
-
receiving a mobile station identifier from a mobile station; transmitting the received mobile station identifier to a remote server; receiving a security code from the mobile station; receiving a pass code from the server; and granting access at the security device when the security code received from the mobile station corresponds to the pass code received from the server. - View Dependent Claims (7)
-
-
8. A method of using wireless communication for obtaining access granted by a security device, comprising the steps of:
-
providing a mobile station identifier from a mobile station to the security device; receiving a security code at the mobile station from a server located remotely from the security device; and transmitting the security code to the security device for obtaining access at the security device when the security code corresponds to a pass code provided by the server to the security device. - View Dependent Claims (9, 10)
-
Specification